What I ended up doing was this:
# Disable snmp from the outside world
/sbin/ipchains -A input -i Serial4 -p udp -d 0/0 161:162 -j DENY --log
# This is an entry for my paranoia...
# If someone locally were running a socks server(for example), I wouldnt
want the outside world
# to bounce off it and still gain entry. I lock down the eth0 to accept only
from my monitoring
# host.
/sbin/ipchains -A input -i eth0 -p udp -s ! my.good.host.local/32 -d 0/0
161:162 -j DENY --log
It seems to works fine with the tests I have made.
----- Original Message -----
From: "bert hubert" <ahu@ds9a.nl>
To: "chris" <lists@powernet.net>
Cc: <LARTC@mailman.ds9a.nl>
Sent: Friday, February 15, 2002 7:28 AM
Subject: Re: [LARTC] simple ipchain filter
> On Thu, Feb 14, 2002 at 09:47:47AM -0800, chris wrote:
>
> > The problem is that with the latest bug in snmp, even shutting it off
> > doesnt help in some cases. I also rely on snmp for network health
info.
I> > would like to just block all snmp traffic at the border. Since this
linux> > router is acting as my border router, this seems to be the best place
to
> > start
> >
> > ipchains -A input -i Serial4 -p udp -d 0/0 161 -j DENY --log
> > ipchains -A input -i Serial4 -p udp -d 0/0 162 -j DENY --log
>
> Looks good.
>
> --
> http://www.PowerDNS.com Versatile DNS Software & Services
> http://www.tk the dot in .tk
> Netherlabs BV / Rent-a-Nerd.nl - Nerd Available -
> Linux Advanced Routing & Traffic Control: http://ds9a.nl/lartc
> _______________________________________________
> LARTC mailing list / LARTC@mailman.ds9a.nl
> http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://ds9a.nl/lartc/
>